Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

NHS fleet goes green with £4m grant for EV charging sockets

Trojanized gaming tool spreads Java-based RAT via browsers and chat platforms

Closed-loop water management to protect the environment

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Trojanized gaming tool spreads Java-based RAT via browsers and chat platforms
Identity

Trojanized gaming tool spreads Java-based RAT via browsers and chat platforms

userBy userFebruary 27, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananFebruary 27, 2026Endpoint security/Windows security

Threat actors lure unsuspecting users into running Trojanized gaming utilities. This utility is distributed via browsers and chat platforms and delivers a remote access trojan (RAT).

“A malicious downloader staged a portable Java runtime and executed a malicious Java archive (JAR) file named jd-gui.jar,” the Microsoft Threat Intelligence team said in a post on X. “The downloader used PowerShell and resident binaries (LOLBins) such as cmstp.exe for stealth execution.”

This attack chain is designed to evade detection by removing the initial downloader and configuring Microsoft Defender exclusions for the RAT component.

Persistence is achieved through a scheduled task and a Windows startup script named “world.vbs” before the final payload is deployed to the compromised host. According to Microsoft, this malware is a “multipurpose malware” that functions as a loader, runner, downloader, and RAT.

When started, it connects to the external server at “79.110.49”.[.]15 inches for command and control (C2) communications. It can leak data and deploy additional payloads.

To protect against this threat, we recommend that users audit Microsoft Defender exclusions and scheduled tasks, remove malicious tasks and startup scripts, isolate affected endpoints, and reset active user credentials on compromised hosts.

This disclosure comes after BlackFog revealed details of a new Windows RAT malware family called Steaelite, which was first promoted on criminal forums in November 2025 as the “best Windows RAT” with “fully undetectable” (FUD) capabilities. Compatible with both Windows 10 and 11.

Unlike other off-the-shelf RATs sold to criminals, Staelite packages data theft and ransomware together into a single web panel, and an Android ransomware module is also in the works. This panel also incorporates various developer tools that facilitate keylogging, client-to-victim chat, file search, USB dissemination, wallpaper changes, UAC bypass, and Clipper functionality.

Other notable features include removing conflicting malware, disabling or configuring exclusions for Microsoft Defender, and installing persistence methods.

Key features of Steaelite RAT include support for remote code execution, file management, live streaming, webcam and microphone access, process management, clipboard monitoring, password theft, enumeration of installed programs, location tracking, arbitrary file execution, URL opening, DDoS attacks, and VB.NET payload compilation.

“This tool gives operators browser-based control of infected Windows machines, covering remote code execution, credential theft, live monitoring, file exfiltration, and ransomware deployment from a single dashboard,” said security researcher Wendy McCaig.

“A single attacker can browse files, exfiltrate documents, collect credentials, and deploy ransomware from the same dashboard. This allows for complete dual extortion from one tool.”

In recent weeks, threat hunters have also discovered two new RAT families tracked as DesckVB RAT and KazakRAT. These enable comprehensive remote control over infected hosts and even selectively deploy post-compromise capabilities. KazakRAT is suspected to be the work of a state-affiliated cluster targeting entities in Kazakhstan and Afghanistan as part of an ongoing campaign that has been ongoing since at least August 2022, according to Ctrl Alt Intel.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleClosed-loop water management to protect the environment
Next Article NHS fleet goes green with £4m grant for EV charging sockets
user
  • Website

Related Posts

Meta files lawsuit against advertisers in Brazil, China, and Vietnam over celebrity baiting fraud

February 27, 2026

Aeternum C2 botnet stores encrypted commands on Polygon blockchain to avoid deletion

February 26, 2026

UAT-10027 Dohdoor backdoor targets US education and healthcare

February 26, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

NHS fleet goes green with £4m grant for EV charging sockets

Trojanized gaming tool spreads Java-based RAT via browsers and chat platforms

Closed-loop water management to protect the environment

Supporting the bright future of neutron science

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.